Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Ubuntu: Cairo regression Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Ubuntu USN-550-1 fixed vulnerabilities in Cairo. A bug in font glyph rendering was uncovered as a result of the new memory allocation routines. In certain situations, fonts containing characters with no width or height would not render any more. This update fixes the problem. We apologize for the inconvenience.
Ubuntu Security Notice USN-550-3          December 13, 2007
libcairo regression

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libcairo2                       1.0.4-0ubuntu1.2

Ubuntu 6.10:
  libcairo2                       1.2.4-1ubuntu2.2

Ubuntu 7.04:
  libcairo2                       1.4.2-0ubuntu1.3

Ubuntu 7.10:
  libcairo2                       1.4.10-1ubuntu4.4

After a standard system upgrade you need to restart your session to effect
the necessary changes.

Details follow:

USN-550-1 fixed vulnerabilities in Cairo.  A bug in font glyph rendering
was uncovered as a result of the new memory allocation routines.  In
certain situations, fonts containing characters with no width or height
would not render any more.  This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Peter Valchev discovered that Cairo did not correctly decode PNG image data.
 By tricking a user or automated system into processing a specially crafted
 PNG with Cairo, a remote attacker could execute arbitrary code with user

Updated packages for Ubuntu 6.06 LTS:

  Source archives:
      Size/MD5:    21759 e41fe630a06c82f9a7f977ace3b72098
      Size/MD5:      758 6c51cf24a74fedd37809e4cc1a7b2f9d
      Size/MD5:  1475777 9002b0e69b3f94831a22d3f2a7735ce2

  Architecture independent packages:
      Size/MD5:   249090 b47a8a55394e4d80991ee7e113a7319a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   379432 db1755dd03cb6872c8812fb95a70fda6
      Size/MD5:   325784 6aa35609e35bd3e585f9c2d8676c41ed

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   349960 c7e8786bf619a5b56ccdc52476495e23
      Size/MD5:   306244 a8b8718de3cae9481c414f8f02ba5353

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   358940 13a0175de8bc77610a04cba052096d52
      Size/MD5:   310650 e85d295192c6f6e519d20cd28688f173

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   345040 40d3cccf5874925daa67421ee0ab90dc
      Size/MD5:   300000 90be630d2e3fcaa03ba18169c5f7a40c

Updated packages for Ubuntu 6.10:

  Source archives:
      Size/MD5:    25217 b27d11953aa5ffdb1820ebd03c18c701
      Size/MD5:      896 6b639fbaa3718b35a0f51f23ac086788
      Size/MD5:  2882781 1222b2bfdf113e2c92f66b3389659f2d

  Architecture independent packages:
      Size/MD5:   299434 a8124a9014a71d7586d9f4bb45ad1977

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   416962 a27dbbca13a988d71677e8ac099095ad
      Size/MD5:   356808 1cc7ed2a382a28f2957a307c40fb9d0a
      Size/MD5:   471606 c147c040284d2780e76a3ecc0bb7b19a
      Size/MD5:   395860 de175306f72fd05d9455d742ffa37e59
      Size/MD5:   158538 42e94f99b1cccb1a95f9fc3cdb6cfa17

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   399782 f0c7f8196fd61e6b92a505c3261ed972
      Size/MD5:   348336 c2914ccbbde0afd38d9118c4bdccd977
      Size/MD5:   446514 8c1c1ee01f3becf3e461f25792c1d017
      Size/MD5:   385636 2b838294cc98af8002ba7f449f3b548d
      Size/MD5:   150090 7a70e041387b1af79661c5aeff7202f6

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   401070 34786d08cd917bd16e07cf225987a620
      Size/MD5:   345396 a47e32ca6af8e3ad2790e361253a97f6
      Size/MD5:   455332 50fb017f4eef8d65a6a6e2ebe757f1ea
      Size/MD5:   383174 61d2144a7d06c05683bcb92365aa8a9d
      Size/MD5:   146982 7d8afc1573aba11efb65584f7cd5f059

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   383912 c623fd762b477c37fcaa1ca2bcb18cf0
      Size/MD5:   333300 3c780eaba574fbed0bcf1ace23f2df54
      Size/MD5:   432132 ced7984d0cb0caf9652c4f75b521797e
      Size/MD5:   369110 e1a57ff50fa5719fbeef537c7cab2b8c
      Size/MD5:   135032 bb15b511c6ba0b5af0d393abf7c1574a

Updated packages for Ubuntu 7.04:

  Source archives:
      Size/MD5:    29768 4a876d28110b1a3424f13da8203b156a
      Size/MD5:      980 60227257968f24dbd908b70cfd998a0a
      Size/MD5:  3081092 b254633046eafe603776d0bee791b751

  Architecture independent packages:
      Size/MD5:   329292 5a2ef8b496d2b39e7c0a30f56a5ec4b2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   515290 dc95d2e57e217895efad772edf0e2b78
      Size/MD5:   430516 5283fd6ecfcbe75a8c6e7a0178074292
      Size/MD5:   537344 c9a42b6ed850f3b2aebbb76ab06eee84
      Size/MD5:   446332 9a87b277055410f469e38247e3fddc02
      Size/MD5:   214120 928e936dd1345e82af7639a4e7f063cd

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   489076 b7e1ebf69179067c25fb6f30f5cf527e
      Size/MD5:   420370 dab0ec21be7bc7ff5dca987465f266aa
      Size/MD5:   508982 569e7c392ea3a3496891390bc9ee7165
      Size/MD5:   435944 7bc22d4300415b54adbd0288c8821170
      Size/MD5:   204148 ae40b67f9ea8d8103bdb15ae38645dbc

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   498570 11f55dc91143a6d0c23bdcf668ab8329
      Size/MD5:   423184 843707e16edccb864293512f6b39c3b2
      Size/MD5:   520668 d56ec59cfb635d7be49f394b78e1cd48
      Size/MD5:   439108 25879c0110630948fbb77a823be74a41
      Size/MD5:   206988 ca62a53a772092f28e6b1f9fa824711a

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   472324 99f77ed05576732e8ee73d7d096fed44
      Size/MD5:   402526 a8e53a33b1c4d3ee50bde4527a9cefc2
      Size/MD5:   492546 43b46a92a315073d18cc951826ad4956
      Size/MD5:   417468 6c85ab3d1c3bdb8499eb612c419b9739
      Size/MD5:   186278 ef8b4a646415a911ff870b2a5b6e16ed

Updated packages for Ubuntu 7.10:

  Source archives:
      Size/MD5:    36111 6c63566f300719be4da7a0bcac09075d
      Size/MD5:     1013 a988294356e56089f185f29bdcb5ae0d
      Size/MD5:  3216689 5598a5e500ad922e37b159dee72fc993

  Architecture independent packages:
      Size/MD5:   407892 1e9ad8fa3de85f6f2f50f3278928f341

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   572456 992d9deed2678d330b6c0d254f775dae
      Size/MD5:   489386 dbe2ea733a7c072891269551aa7177ba
      Size/MD5:   633054 94340a3751ba5b35911a34b42d0b53c3
      Size/MD5:   537180 ba458194ce4234a1e7735e34705c998d
      Size/MD5:   195868 d288b4d3a3feb119a20595ccec9cd6f8

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   546768 ce0e739d1d19d8fc29c88d72bbfa5b6c
      Size/MD5:   479970 798eb7fc786c5d0759215f462252c8df
      Size/MD5:   601468 ef0f0772ab913e8695b53dccb56494b6
      Size/MD5:   524340 a418f4341d95ed191415b5d2365bd586
      Size/MD5:   186454 8485e6b8030f52f62c6a905cab3352e1

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   555094 258ea4c57683624d80c8cb8e6c544b70
      Size/MD5:   479242 e23bc3b619bc533d25eb9873bb6e68b4
      Size/MD5:   614090 cd5520db5b878821d52ed13ad69747b7
      Size/MD5:   528694 5416ec8f3f67c509fc52b3f01f22b96b
      Size/MD5:   186298 b6a9fd722001d6fcd0987b3a88503f99

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   543968 126b4d740f9ad684c6e47c286b87afc8
      Size/MD5:   471474 e897822f36019d17501472bc9b6c4791
      Size/MD5:   585030 c0cf996cb88ed74b0886f76ec35cc7b7
      Size/MD5:   505554 f20daf037a08ad67b818c98ad7717bea
      Size/MD5:   177700 79888f6855ad4b9b64741c955b0581fd

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Feds Charged With Stealing Money During Silk Road Investigation
EFF questions US government's software flaw disclosure policy
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.